Full Disclosure mailing list archives
RE: [ISN] How To Save The Internet
From: "Marchand, Tom" <Tom.Marchand () bcbsfl com>
Date: Tue, 22 Mar 2005 15:56:27 -0500
Plus, the same code could possibly be considered legitimate for one owner and non-legitimate for another. -----Original Message----- From: David Gillett [mailto:gillettdavid () fhda edu] Sent: Tue 3/22/2005 11:45 AM To: jasonc () science org; jericho () attrition org Cc: isn () c4i org; sberinato () cio com; full-disclosure () lists grok org uk; bugtraq () securityfocus com Subject: RE: [ISN] How To Save The Internet Jason Coombs [mailto:jasonc () science org] writes: <snip>
... the core problem with computer security is that our CPUs make no effort to restrict the execution of machine code to that very small subset of all possible machine code which constitutes the code that the owner of the CPU desires it to run.
<snip>
If anyone really cared about solving this core security problem with computing today, it would be solved in just a few months.
Just one of the myriad of security issues that we're grappling with are the various rights of the owner of the CPU, the *operator* of the CPU, and the owner of the *data*, each of whom may have a more or less legitimate say in what code actually gets executed. Far too many folks have already "solved" this problem incorrectly for me to believe that the "just a few months" solution you envisage will actually be correct. David Gillett Blue Cross Blue Shield of Florida, Inc., and its subsidiary and affiliate companies are not responsible for errors or omissions in this e-mail message. Any personal comments made in this e-mail do not reflect the views of Blue Cross Blue Shield of Florida, Inc. The information contained in this document may be confidential and intended solely for the use of the individual or entity to whom it is addressed. This document may contain material that is privileged or protected from disclosure under applicable law. If you are not the intended recipient or the individual responsible for delivering to the intended recipient, please (1) be advised that any use, dissemination, forwarding, or copying of this document IS STRICTLY PROHIBITED; and (2) notify sender immediately by telephone and destroy the document. THANK YOU. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Re: [ISN] How To Save The Internet, (continued)
- Re: [ISN] How To Save The Internet Keith Oxenrider (Mar 22)
- CISSP Test Vladamir (Mar 22)
- Re: CISSP Test robert (Mar 22)
- Re: Re: CISSP Test Andre Ludwig (Mar 22)
- CISSP Test Vladamir (Mar 22)
- Re: [ISN] How To Save The Internet Keith Oxenrider (Mar 22)
- RE: [ISN] How To Save The Internet David Gillett (Mar 22)
- Re: [ISN] How To Save The Internet Ben Vaisvil (Mar 23)
- Re: [ISN] How To Save The Internet Devdas Bhagat (Mar 23)
- Re: [ISN] How To Save The Internet Scott Berinato (Mar 22)
- Re: [ISN] How To Save The Internet Scott Berinato (Mar 22)
- Re: [ISN] How To Save The Internet Scott Berinato (Mar 22)
- RE: [ISN] How To Save The Internet Marchand, Tom (Mar 22)
- Re: [ISN] How To Save The Internet Jason Coombs (Mar 22)
- RE: [ISN] How To Save The Internet Arndt . WA (Mar 23)
- Re: [ISN] How To Save The Internet Jason Coombs (Mar 23)
- RE: RE: [ISN] How To Save The Internet Glenn_Everhart (Mar 23)
- RE: [ISN] How To Save The Internet Michael Wojcik (Mar 23)